T/F: Security is the probability that a system will perform as expected for a specified period of time.

FALSE

Generally the more programs in memory, ________ of the processor.

the greater the utilization

The simplest approach to managing memory for multiple concurrent programs, ________, divides the available space into fixed‑length partitions each of which holds one program
(4 words)

Fixed-partition memory management

T/F: The external paging device is usually RAM.

FALSE

With segmentation, programs are divided into independently addressed segments and stored in __________ memory.

Noncontiguous

On a segmented system the dynamically expanded address consists of __________.

A segment number, andA displacement.

If a program attempts to modify (or sometimes even to read) the contents of memory locations that do not belong to it, the operating system's __________ routine intervenes and (usually) terminates the program.

Memory protection

____ protects your computer from viruses and spyware that may attempt to steal your password.

Secure Logon

____ ensures that a second user can log on to a locked computer without logging off the first user and losing their work.

Fast user switching

Holding down the ____ key during the boot process stops the automatic logon from occurring.

Shift

The ____ account is the most powerful local user account possible.

Administrator

The ____ account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users.

Guest

The Guest account derives all of its privileges from being a member of the Guests group and the ____ group.

Everyone

Members of the ____ group can back up and restore all files and folders on the computer.

Backup Operators

Members of the ____ group are able to monitor performance counters and access performance logs on the computer.

Performance Log Users

Members of the ____ group are able to monitor performance counters on the computer, but cannot access performance logs.

Performance Monitor Users

An administrator account derives its privileges from being a member of the local ____ group.

Administrators

The ____ applet in Control Panel is a simplified interface for user management.

User Accounts

The ____ profile is used when new user profiles are created.

Default

In Windows 7, the default profile is configured using ____.

Sysprep

T/F: The most critical effect of malware is degraded system performance.

FALSEit is the least critical effect.

The most commonly used method for authentication is:

a username and password.

NTFS permissions can be easily circumvented when:

you have physical access to a computer.

T/F: In Windows 7, advanced audit policies can only be edited at a command-line.

FALSE

T/F: Every object in Windows 7 has audit events related to it.

TRUE

____ is a threat to privacy and often makes systems unstable.

Spyware
or Viruses, Adware, Malware, Worms, etc.

A(n) ____ computer is one that has outdated antivirus signatures or is missing security updates.

Unhealthy, or Unsafe

While ____ is a great source of information, it is also the biggest source of malware (malicious software).

the Internet

____ is software that is silently installed on your computer, monitors your behavior, and performs actions based on your behavior.

Spyware (specifically)

The most basic level of data security in Windows 7 is ____ permissions.

NTFS

____ is the process of taking data and making it unreadable

Encryption

____ is the process of taking data that is unreadable and making it readable again.

Decryption

A(n) ____ encryption algorithm uses the same key to encrypt and decrypt data.